Choose from several options for complete web, email and data security.
Evaluate Websense products by watching demos and installing evaluation software.
Learn how Websense solutions help keep our customer safe, secure and productive
Get information on product updates, support resources and more.
Get the most out of support in five simple steps.
Find tools and assets to help sell Websense solutions.
Come work for the global leader in unified information security.
we want to hear from you >
The only constant in corporate security is change. Websense became famous as the best URL filtering company. We invented our ThreatSeeker Network and the world’s first Honey Grid, and as a result, we know the Web better than anyone else. Our customers saw Websense filtering as nice-to-have software that helped employees be productive and prohibited inappropriate use of a company’s Internet access.
But as our knowledge of the Web deepened, we were on the front lines as more attacks and security threats moved online. We quickly became the go-to experts on Web-based threats and our technology was so ingrained within the Web that we often were the first company to detect these threats. As we moved from filtering to Web security, we often protected our customers from Web threats before competitors were even aware that they existed.
Yesterday we announced a revolutionary new weapon for those looking to combat today’s most pressing and urgent security issues, while still taking full advantage of all that the internet has to offer.
Let’s face it: Zeus, Stuxnet, Aurora, and WikiLeaks prove that legacy security products are totally ineffective against modern threats. This is a wakeup call for the security industry.
Consider these facts from a recent Miercom test:
Blue Coat is only 18.9 % effective at blocking modern malware threats, Cisco is only 12.8% effective. Blue Coat is only 29.4% effective at blocking dynamic content on the social Web. McAfee is only 19.8% effective.
And our own research shows that 20 percent of daily email threats are undetected by AV, UTMs, firewalls, and proxies. This is a failure of the security industry in general, and it cannot be solved with the latest DAT file.
In the meantime, while the rest of the industry is talking about concepts down the road, the real security paradigm shift occurred yesterday.
One could argue that the impact of social networking sites on the business world today rivals significant technological changes that occurred in the industrial revolution.
According to a study by global communications firm Burson-Marsteller, more than three-quarters of the Fortune Global 100 companies are using at least one of the most popular social media platforms (Twitter, Facebook, YouTube, and corporate blogs) to actively engage with stakeholders. Sixty-five percent of the largest 100 international companies have active accounts on Twitter, 54 percent have a Facebook fan page, 50 percent have a YouTube channel, and one-third have corporate blogs.
The Nielsen Wire reports that the world now spends over 100 billion minutes or 22 percent of all time online on social networks and blog sites.
In the recent years social networks have become a new generation Web tool for corporate environments, offering sophisticated business intelligence, marketing, and analytical capabilities. The rise of Web 2.0 has predominately been steered by the prolific penetration achieved by social network engines such as Facebook, MySpace, and LinkedIn amongst diverse user groups, satisfying both business and common-user needs. Today, social networks boast a subscriber base that includes entrepreneurs, business executives and celebrities in addition to the younger generation of Web-users.
Security threats in email have been a longtime cause for concern.
Multimillion dollar companies that say they can combat these threats have made a lucrative business by providing reactive security specific to an individual piece of code. The problem with having this type of security in your organization is your exposure to modern threats. These security providers can only update signatures to chase threats after they happen, a method that is archaic at best.
Hackers have outsmarted antivirus vendors by placing threats where traditional antivirus companies can’t find them. These cybercriminals are no longer spending their time trying to get people to click on compromised images in emails, such as free screen-savers. Instead, hackers have gone from inserting threats in emails to using email as a vehicle to transport users to compromised sites. Today, users are literally taken for a ride (via email) to these dangerous destinations online.
Now that the genesis of Facebook is fodder for a major Hollywood film, I suppose we can no longer apply the term "over-hyped" to anything involving social networking. We've moved well beyond such contrite terms as Web 2.0 as these tools embedded themselves into our lives to become the world as we know it.
It seems like only a few years ago that IT security could simply block access to a few social networking services and call it a day. But now even the United States Department of Defense struggles to balance the seemingly contradictory needs of security and access to an important personal communications tool. While some might still consider social networking little more than a distraction or fad, it's clear that these services are as important to younger workers (and members of Congress) as letter writing, newspapers, and oxygen...
Facebook, LinkedIn, and Twitter were created for social networking — not security. These sites—with their rapid flow of new content and communications—are powerful tools for networking and research. But they’ve also opened up gaping security holes. The dangers associated with social networking are magnified in businesses, as organizations are exposed to data loss risks in real time. This problem becomes increasingly complex when you consider the speed in which the Web evolves and its adaptation as a business tool.
The famous bank robber Willie Sutton said that he robbed banks because, “That’s where the money is.” Today’s hackers attack large organizations because, “That’s where the data is.” Organized criminals—and many companies—see data as the world’s newest form of currency...
Last month, we took a deep dive into the risks of data loss in businesses:
· Implementing DLP: Purchase with Caution?
· Top 3 Steps to Simplify DLP Without Compromise by Rich Mogull, Securosis L.L.C.,
· Websense Introduces “DLP for Download” – the Fastest and Easiest Way to Deploy Enterprise-Class Data Loss Prevention
· Microsoft and Websense Team Up to Protect Data and Expand Solution Coverage
· Websense Continues to Revolutionize DLP with New Technologies and an Unprecedented Deployment Model
This month, we are focusing on social media...
Tomorrow begins Black Hat USA 2010, one of the most anticipated security conferences of the year, and our exceptional Websense Security Labs team will be in force, through presentations on research topics including automatically locating vendor security patches and providing thought leadership during the Cloud Security Alliance Summit.
The Cloud Security Alliance Summit was developed by the Cloud Security Alliance, a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing...
Web Security Gateway Anywhere). The V5000 provides another option for customers to take advantage of Websense TRITON architecture to reduce complexity and IT footprint and provide small to medium sized businesses the same flexible deployment, state-of-the-art security and flexible deployment models inherent within Websense solutions.
Generally available today, the new Websense V5000 appliance is the ideal appliance for enterprise branch office and medium business deployments. With support for up to 2000 users, the V5000 is preconfigured to simplify deployment of Websense Web Security Gateway solutions (including
V-Series appliances deliver a unique combination of extensibility, performance and simple deployment. Onboard virtualization consolidates multiple security functions to a single hardware platform while supporting future enhancements. V-Series appliances significantly reduce deployment time and operational costs for Websense Web Security Gateway customers, while meeting enterprise scalability requirements..